Threat behavior detection and model establishment method, device, electronic device and storage medium
A technology for detecting models and behaviors. It is applied in the field of network security and can solve the problems of occupying computing resources and low efficiency of internal threat behavior detection.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0038] The technical solutions in the embodiments of the present application will be described below with reference to the accompanying drawings in the embodiments of the present application.
[0039] In the existing network security protection technologies, the methods for detecting insider threats include: method 1, collecting user attribute information, including name, age, gender, psychological evaluation, interpersonal communication, job completion quality, job satisfaction, etc.; After the data is cleaned and preprocessed, the similarity between users is calculated through the user portraits; the K-Means algorithm is used to cluster the user attribute portraits to obtain user groups with similar behavior patterns; the second method is to obtain user behavior information and identification information; According to the user's behavior sample set, the long-short-term memory network classification model is obtained by training; according to the user identification informatio...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com